B.Tech Ece Mst 2 DBMS

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by Rajat Khurana
R
Rajat Khurana
Community Contributor
Quizzes Created: 1 | Total Attempts: 94
Questions: 20 | Attempts: 94

SettingsSettingsSettings
B.Tech Ece Mst 2 DBMS - Quiz

MST DBMS (Minor Degree) B. Tech ECE Sem 4


Questions and Answers
  • 1. 

    Which is not DML Command?

    • A. 

      Delete

    • B. 

      Select

    • C. 

      Update

    • D. 

      Create

    Correct Answer
    D. Create
    Explanation
    The given question asks for a DML (Data Manipulation Language) command that is not included in the options. The options provided are Delete, Select, Update, and Create. Out of these options, Create is the correct answer as it is a DDL (Data Definition Language) command used to create database objects such as tables, indexes, or views. DML commands are used to manipulate data within the database, while DDL commands are used to define the structure of the database.

    Rate this question:

  • 2. 

    The “all-or-none” property is commonly referred to as  ________

    Correct Answer
    Atomicity
    Explanation
    The "all-or-none" property refers to the concept of atomicity. In computer science, atomicity means that a transaction or operation is treated as a single, indivisible unit. It either happens completely or not at all, without any partial or incomplete results. This property ensures that if an operation fails or is interrupted, the system will roll back to its previous state, maintaining data integrity. Therefore, the correct answer for this question is atomicity.

    Rate this question:

  • 3. 

    Execution of translation in isolation preserves the _________ of a database

    • A. 

      Atomicity

    • B. 

      Consistency

    • C. 

      Durability

    • D. 

      All of the mentioned

    Correct Answer
    B. Consistency
    Explanation
    The execution of translation in isolation preserves the consistency of a database. This means that when multiple transactions are executed concurrently, the database remains in a consistent state throughout. Consistency ensures that all data in the database follows predefined rules and constraints. It guarantees that any changes made to the database are valid and do not violate any integrity constraints. Therefore, maintaining consistency is crucial to ensure the accuracy and reliability of the database.

    Rate this question:

  • 4. 

    Which of the following is not a transaction state?

    • A. 

      Active

    • B. 

       Partially committed

    • C. 

      Failed

    • D. 

      Compensated

    Correct Answer
    D. Compensated
    Explanation
    The option "Compensated" is not a transaction state because it is not a standard state in the transaction processing model. In transaction processing, the common states are Active, Partially Committed, and Failed. "Compensated" does not fit into any of these categories and is not recognized as a transaction state.

    Rate this question:

  • 5. 

    Is DBMS is software. 

    • A. 

      True

    • B. 

      False

    Correct Answer
    A. True
    Explanation
    DBMS stands for Database Management System, which is a software that allows users to create, manage, and manipulate databases. It provides an interface for users to interact with the database, perform operations such as data insertion, deletion, and retrieval, and ensures data integrity and security. Therefore, DBMS is indeed a software, making the answer "True" correct.

    Rate this question:

  • 6. 

    The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.

    • A. 

      Shadow copy

    • B. 

      Shadow Paging

    • C. 

      Update log records

    • D. 

      All of the above

    Correct Answer
    B. Shadow Paging
    Explanation
    Shadow Paging is a scheme that uses a page table containing pointers to all pages. In this scheme, the page table itself and all updated pages are copied to a new location. This ensures that the original data remains unmodified during the copying process, allowing for consistent and reliable data access. Therefore, the correct answer is Shadow Paging.

    Rate this question:

  • 7. 

    If a transaction does not modify the database until it has committed, it is said to use the ___________ technique.

    • A. 

      Late-modification

    • B. 

      Immediate-modification

    • C. 

      Deferred-modification

    • D. 

      Undo

    Correct Answer
    C. Deferred-modification
    Explanation
    Deferred-modification is the correct answer because in this technique, a transaction does not modify the database immediately. Instead, the modifications are kept in a separate area called the "transaction log" until the transaction is committed. This allows for better concurrency control and recovery mechanisms, as the modifications can be easily rolled back or undone if needed.

    Rate this question:

  • 8. 

     Which forms are based on the concept of functional dependency:

    • A. 

      1 NF

    • B. 

      2 NF

    • C. 

      3 NF

    • D. 

      4 NF

    Correct Answer
    C. 3 NF
    Explanation
    The answer is 3 NF because the concept of functional dependency is a key principle in 3NF. Functional dependency refers to the relationship between attributes in a database, where one attribute determines the value of another attribute. In 3NF, every non-key attribute must be functionally dependent on the primary key, and there should be no transitive dependencies. This ensures that the database is free from redundancy and anomalies, leading to better data integrity and efficiency.

    Rate this question:

  • 9. 

    Which of the following is used to denote the selection operation in relational algebra?

    • A. 

      Lambda

    • B. 

      Omega

    • C. 

      Pi

    • D. 

      Sigma

    Correct Answer
    D. Sigma
    Explanation
    Sigma is used to denote the selection operation in relational algebra. The selection operation is used to retrieve tuples from a relation that satisfy a specified condition. It acts as a filter, selecting only the tuples that meet the specified criteria. Sigma is commonly represented using the Greek letter sigma (Σ), which is why it is the correct answer in this case.

    Rate this question:

  • 10. 

    Which of the following displays the unique values of the column? SELECT ________ dept_name FROM instructor;

    • A. 

      All

    • B. 

      From

    • C. 

      Name

    • D. 

      Distinct

    Correct Answer
    D. Distinct
    Explanation
    The "Distinct" keyword in the SELECT statement is used to display only unique values of the specified column. In this case, it will display the unique values of the "dept_name" column from the "instructor" table.

    Rate this question:

  • 11. 

    Which columns will be displayed SELECT * FROM employee WHERE salary>10000 AND dept_id=101;

    • A. 

      Salary, dept_id

    • B. 

      Employee

    • C. 

      Salary

    • D. 

      All the field of employee relation

    Correct Answer
    D. All the field of employee relation
    Explanation
    The correct answer is "All the field of employee relation." This means that when executing the given SQL query, all the columns of the "employee" relation will be displayed in the result. The query specifies a condition where the salary should be greater than 10000 and the department ID should be 101, but it does not specify any specific columns to be displayed. Therefore, the query will return all the columns of the "employee" relation that satisfy the given conditions.

    Rate this question:

  • 12. 

    A query in the tuple relational calculus is expressed as:

    • A. 

      {t | P() | t}

    • B. 

      {P(t) | t }

    • C. 

      {t | P(t)}

    • D. 

      All of the mentioned

    Correct Answer
    C. {t | P(t)}
    Explanation
    The correct answer is {t | P(t)}. This is the correct representation of a query in the tuple relational calculus. It states that we want to retrieve all tuples t from a relation where the predicate P(t) is true. This notation is commonly used to express queries in the tuple relational calculus.

    Rate this question:

  • 13. 

     A set of possible data values is called

    • A. 

      Attribute

    • B. 

      Degree

    • C. 

      Domain

    • D. 

      Tuple

    Correct Answer
    C. Domain
    Explanation
    In the context of data, a domain refers to the set of possible values that a data attribute can take. It defines the range or the type of values that can be stored in a specific attribute. Therefore, the correct answer is "Domain".

    Rate this question:

  • 14. 

    Which command(s) is (are) used to redefine a column of table in SQL?

    • A. 

      Define Table

    • B. 

      Modify table

    • C. 

      Alter Table

    • D. 

      All of the above

    Correct Answer
    C. Alter Table
    Explanation
    The correct answer is "Alter Table". The ALTER TABLE command is used to modify the structure of an existing table in SQL. It allows you to add, delete, or modify columns in a table. This command is commonly used to redefine a column by changing its data type, size, or constraints. The other options, "Define Table" and "Modify Table", are not valid SQL commands for redefining a column in a table.

    Rate this question:

  • 15. 

    True or false? Authorization aims to determine who the user is, and authentication aims to restrict what operations/data the user can access.

    • A. 

      True

    • B. 

      False

    Correct Answer
    B. False
    Explanation
    False. The correct answer is that authentication aims to determine who the user is, and authorization aims to restrict what operations/data the user can access. Authentication is the process of verifying the identity of a user, while authorization is the process of granting or denying access to specific resources or actions based on the authenticated user's privileges.

    Rate this question:

  • 16. 

    T or F? In role-based access control, each user is assigned one or more roles, and the roles determine which parts of the system the user is allowed to access.

    • A. 

      True

    • B. 

      False

    Correct Answer
    A. True
    Explanation
    In role-based access control, each user is assigned one or more roles, which determine the level of access they have within the system. These roles are typically based on the user's job function or responsibilities. By assigning roles to users, the system can easily manage and enforce access permissions, ensuring that users only have access to the parts of the system that are necessary for their role. Therefore, the statement "In role-based access control, each user is assigned one or more roles, and the roles determine which parts of the system the user is allowed to access" is true.

    Rate this question:

  • 17. 

    In 2NF

    • A. 

      No functional dependencies (FDs) exist

    • B. 

      No multivalued dependencies (MVDs) exist

    • C. 

      No partial FDs exist

    • D. 

      No partial MVDs exist

    Correct Answer
    C. No partial FDs exist
    Explanation
    The given answer states that in 2NF, no partial functional dependencies (FDs) exist. This means that for a given relation in 2NF, no non-key attribute is functionally dependent on only a part of the primary key. In other words, all non-key attributes in the relation are fully dependent on the entire primary key. This is an important characteristic of 2NF, as it helps eliminate redundancy and ensures data integrity in the database.

    Rate this question:

  • 18. 

    Which one of the following uniquely identifies the elements in the relation?

    • A. 

      Secondary Key

    • B. 

      Primary Key

    • C. 

      Foreign key

    • D. 

      Composite key

    Correct Answer
    B. Primary Key
    Explanation
    The primary key uniquely identifies the elements in a relation. It is a column or a set of columns in a table that uniquely identifies each row in that table. No two rows can have the same primary key value, ensuring data integrity and uniqueness.

    Rate this question:

  • 19. 

    Drop Table cannot be used to drop a table referenced by a _________ constraint.

    • A. 

      Local Key

    • B. 

      Primary Key

    • C. 

      Composite Key

    • D. 

      Foreign Key

    Correct Answer
    D. Foreign Key
    Explanation
    The DROP TABLE statement is used to remove a table from the database. However, if a table is referenced by a foreign key constraint, it cannot be dropped using the DROP TABLE statement. This is because the foreign key constraint ensures referential integrity between tables, and dropping the table would violate this constraint. Therefore, the DROP TABLE statement cannot be used to drop a table referenced by a foreign key constraint.

    Rate this question:

  • 20. 

    Which one of the following is a procedural language?

    • A. 

      Domain relational calculus

    • B. 

      Tuple relational calculus

    • C. 

      Relational algebra

    • D. 

      Query language

    Correct Answer
    C. Relational algebra
    Explanation
    Relational algebra is a procedural language used to manipulate and query relational databases. It provides a set of operations to retrieve, modify, and combine data stored in tables. Unlike declarative languages like domain relational calculus and tuple relational calculus, which focus on specifying what data is needed without specifying how to retrieve it, relational algebra focuses on the procedural steps and operations required to achieve the desired results. Therefore, the correct answer is relational algebra.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.